Redirecting you to

Security Terminology

Easily understandable explanations of common industry terms.

  • Learn More

    Akira takes in $42 million in ransom payments, now targets Linux servers

    A News Article from Sectigo

    News Article Apr 24, 2024

    The Akira ransomware group netted itself $42 million in payments in the last year from over 250 organizations, according to a joint advisory released April 18 by four leading cybersecurity agencies across Europe and the United States.

  • Learn More

    Malvertising: Fake Popular Software Ads Deliver New MadMxShell Backdoor

    A News Article from Sectigo

    News Article Apr 24, 2024

    IT professionals are under attack! This article exposes a malicious malvertising campaign targeting IT teams with a novel backdoor named MadMxShell. Learn how attackers use typosquatting and DNS techniques to compromise systems.

  • Learn More

    Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments

    A News Article from Sectigo

    News Article Apr 24, 2024

    Hackers are using unpublished GitHub and GitLab comments to generate phishing links that appear to come from legitimate open source software (OSS) projects.

  • Learn More

    NVD delays highlight vulnerability management woes: Put malware first

    A News Article from Sectigo

    News Article Apr 24, 2024

    A decision by the National Institute of Standards and Technology (NIST) to change how it maintains the widely used National Vulnerability Database (NVD) has focused attention on the brittle nature of current enterprise vulnerability management processes.

  • Learn More

    Brute Force Password Cracking Takes Longer, But Celebration May Be Premature

    A News Article from Sectigo

    News Article Apr 24, 2024

    Brute force cracking of passwords takes longer now than in the past, but the good news is not a cause for celebration, according to the latest annual audit of password cracking times released Tuesday by Hive Systems.

    Depending on the length of the password and its composition — the mix of numbers, letters, and special characters — a password can be cracked instantly or take half a dozen eons to decipher.

  • Learn More

    Sectigo Sponsors RSA 2024

    A Press Release from Sectigo

    Press Release Apr 24, 2024

    SCOTTSDALE, Ariz., — April 24, 2024 — Sectigo®, the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), and website cybersecurity announced today its participation in RSA 2024, held May 6-9 at the Moscone Center in San Francisco.

  • Learn More

    eIDAS 2.0: The concerns surrounding this new standard

    A Blog Post from Sectigo

    Blog Post Apr 24, 2024

    Discover how eIDAS 2.0 aims to streamline online transactions while facing concerns over privacy and centralization.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 380

    Broadcast Date:
    April 23, 2024

    29 minutes

    Podcast Apr 23, 2024

    Root Causes 380: If Quantum Supremacy Comes Earlier Than Expected

    We talk about the challenges to PQC migration and what happens if quantum computers break RSA before we're expecting them to.

  • Learn More

    What is certificate discovery and why is it important?

    A Blog Post from Sectigo

    Blog Post Apr 18, 2024

    Digital certificates ensure cybersecurity, but visibility into inventory is crucial. Explore certificate discovery's role in effective CLM.

  • Learn More

    Sisense Password Compromise Triggers a CISA Alert Requiring Credentials Reset

    A News Article from Sectigo

    News Article Apr 18, 2024

    A CISA alert has directed Sisense customers to reset their account login credentials, secrets, and tokens after a password compromise impacted the business intelligence and data analytics company.

  • Learn More

    Trouble Managing Digital Certificate Sprawl? There's A Mid-Market Solution For That

    A News Article from Sectigo

    News Article Apr 18, 2024

    Keeping track of and managing digital certificates can be a nightmare for IT departments. Certs need to be set up, configured, and renewed before they expire or are revoked.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 379

    Broadcast Date:
    April 18, 2024

    13 minutes

    Podcast Apr 18, 2024

    Root Causes 379: AI-generated Fake IDS for KYC

    Inexpensive and easily obtained deepfake photographs of IDs, generated by AI, are available online. These pose a problem for KYC initiatives.